Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
ab750bf0 by Salvatore Bonaccorso at 2021-05-11T11:02:27+02:00
Update gnucobol/open-cobol bug links to new path.

Thanks: Petter Reinholdtsen <[email protected]>

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -118212,7 +118212,7 @@ CVE-2019-16396 (GnuCOBOL 2.2 has a use-after-free in 
the end_scope_of_program_na
        - open-cobol <removed>
        [stretch] - open-cobol <ignored> (Minor issue)
        [jessie] - open-cobol <no-dsa> (Minor issue)
-       NOTE: https://sourceforge.net/p/open-cobol/bugs/587/
+       NOTE: https://sourceforge.net/p/gnucobol/bugs/587/
        NOTE: Fixed by: https://sourceforge.net/p/open-cobol/code/3347/
 CVE-2019-16395 (GnuCOBOL 2.2 has a stack-based buffer overflow in the 
cb_name() functi ...)
        - gnucobol 4.0~early~20200606-1 (low; bug #940949)
@@ -118220,7 +118220,7 @@ CVE-2019-16395 (GnuCOBOL 2.2 has a stack-based buffer 
overflow in the cb_name()
        - open-cobol <removed>
        [stretch] - open-cobol <ignored> (Minor issue)
        [jessie] - open-cobol <no-dsa> (Minor issue)
-       NOTE: https://sourceforge.net/p/open-cobol/bugs/586/
+       NOTE: https://sourceforge.net/p/gnucobol/bugs/586/
        NOTE: Fixed by: https://sourceforge.net/p/open-cobol/code/3346/
 CVE-2019-16390
        RESERVED
@@ -124260,7 +124260,7 @@ CVE-2019-14541 (GnuCOBOL 2.2 has a stack-based buffer 
overflow in cb_encode_prog
        - open-cobol <removed>
        [stretch] - open-cobol <ignored> (Minor issue)
        [jessie] - open-cobol <no-dsa> (Minor issue)
-       NOTE: https://sourceforge.net/p/open-cobol/bugs/584/
+       NOTE: https://sourceforge.net/p/gnucobol/bugs/584/
 CVE-2019-14540 (A Polymorphic Typing issue was discovered in FasterXML 
jackson-databin ...)
        {DSA-4542-1 DLA-1943-1}
        - jackson-databind 2.10.0-1 (bug #940498)
@@ -124314,7 +124314,7 @@ CVE-2019-14528 (GnuCOBOL 2.2 has a heap-based buffer 
overflow in read_literal in
        - open-cobol <removed>
        [stretch] - open-cobol <ignored> (Minor issue)
        [jessie] - open-cobol <no-dsa> (Minor issue)
-       NOTE: https://sourceforge.net/p/open-cobol/bugs/583/
+       NOTE: https://sourceforge.net/p/gnucobol/bugs/583/
 CVE-2019-14527 (An issue was discovered on NETGEAR Nighthawk M1 (MR1100) 
devices befor ...)
        NOT-FOR-US: NETGEAR
 CVE-2019-14526 (An issue was discovered on NETGEAR Nighthawk M1 (MR1100) 
devices befor ...)
@@ -124461,7 +124461,7 @@ CVE-2019-14486 (GnuCOBOL 2.2 has a buffer overflow in 
cb_evaluate_expr in cobc/f
        - open-cobol <removed>
        [stretch] - open-cobol <ignored> (Minor issue)
        [jessie] - open-cobol <no-dsa> (Minor issue)
-       NOTE: https://sourceforge.net/p/open-cobol/bugs/582/
+       NOTE: https://sourceforge.net/p/gnucobol/bugs/582/
 CVE-2019-14485
        RESERVED
 CVE-2019-14484
@@ -124502,7 +124502,7 @@ CVE-2019-14468 (GnuCOBOL 2.2 has a buffer overflow in 
cb_push_op in cobc/field.c
        - open-cobol <removed>
        [stretch] - open-cobol <ignored> (Minor issue)
        [jessie] - open-cobol <no-dsa> (Minor issue)
-       NOTE: https://sourceforge.net/p/open-cobol/bugs/581/
+       NOTE: https://sourceforge.net/p/gnucobol/bugs/581/
 CVE-2019-14467 (The Social Photo Gallery plugin 1.0 for WordPress allows 
Remote Code E ...)
        NOT-FOR-US: Social Photo Gallery plugin for WordPress
 CVE-2019-14466 (The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is 
vulnerable  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ab750bf03e177a6c85e498e3e7e98d9a358229e4

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ab750bf03e177a6c85e498e3e7e98d9a358229e4
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to